-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [CNI]: Optional Default CNI Plugin Installation #71
Comments
looks like this might be working for some people : awslabs/amazon-eks-ami#117 |
@gaurav-dalvi did the workaround work for you? It didn’t work for me. |
yeah same here. did not work for me either. |
Any updates on this? Just wondering... it really sucks having to hack some stuff just to opt out... |
Damn, I really think this should be top priority. In forums, chats, slacks, IRCs, telegram groups, whatever, you name it... there are so many people/companies not choosing EKS because of the pod LIMIT. This simply erases the whole point of kubernetes. Also... have any of you tried CNI-Genie?? : https://github.com/Huawei-PaaS/CNI-Genie |
Yeah, I'm using cni-genie at the moment. if you install it to the master node and configure the default to a different CNI before you create the ec2 worker nodes, it works like a charm. However, automating this is kinda difficult. |
W-O-W, even if automating it is a PITA, knowing that it works with EKS is something great to hear! so many thanks! |
I mean.... yeah... it works. I'd still rather not have to stop my cloudformation scripts to run a few kubectl commands before continuing them to create the worker nodes. |
Would love to see some movement on this issue so that I can use a CNI other than AWS VPC CNI. |
@TigerC10 do you have any article that describes the process? I would love to try this out. |
Closing as duplicate of #923 which we are working on |
Tell us about your request
I would like an option to disable default installation of the AWS VPC CNI Plugin during create cluster.
Which service(s) is this request for?
EKS
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
When an EKS cluster is created, the AWS VPC CNI Plugin is automatically installed to the cluster as the default CNI plugin. In order to change the plugin, the AWS VPC CNI plugin must be uninstalled before worker nodes join the cluster, or else all existing worker nodes must be destroyed after removing the default and installing a different CNI plugin.
Alternatively, a custom AMI must be supplied to the worker nodes which use a lower CNI plugin prefix than
10
so that the worker node loads it before loading the AWS VPC CNI Plugin.In either of these cases, clusters become less "deployable" with automated tooling. In one case there are manual steps involved in the deployment of a cluster (and possibly a race condition), and in the other case a custom AMI is required which could become out-dated over time as Amazon releases new AMI base images.
Are you currently working around this issue?
Currently building a custom AMI with an alternate CNI plugin installed with
00-
prefix.Additional context
awslabs/amazon-eks-ami#117
aws/amazon-vpc-cni-k8s#214
aws/amazon-vpc-cni-k8s#176
The text was updated successfully, but these errors were encountered: